What do you do when you know a crucial piece of digital evidence should be somewhere in a phone’s file, or in the Cloud, or in the social media account – yet it’s nowhere to be found? What are your options for finding that text message or photo?
read more
The initiative, called FIREStarter, will engage both traditional and non-traditional students through the establishment of a cyber range—a new Forensic and Incident Response Environment, or “FIRE” in FIREStarter.
read more
The findings highlight the need for the on-going training for police officers who routinely draw upon digital evidence in their investigations.
read more
During their proof-of-concept demonstration, the research team identified a previously unknown vulnerability, which they call iTimed.
read more
A professor recently took a closer look at how eyewitness and video perspectives differ in the courtroom.
read more
With digital intelligence technology combined with investigator smarts, some pieces of evidence that have been tampered with can be detected, after all.
read more
In the wake of the Taliban’s takeover of Kabul and the ouster of the Afghan national government, alarming reports indicate that the insurgents could potentially access biometric data collected by the U.S. to track Afghans, including people who worked for U.S. and coalition forces.
read more
Many commonly reported cyberattacks focus on computer software vulnerabilities. But what about computer hardware?
read more
Researchers are working to develop a new branch of cyber forensics called AI Psychiatry that seeks to keep data more secure in a constantly evolving technological landscape.
read more
It is critical that collection of digital data by frontline officers be authorized by agency command with clear procedures in place to ensure all data is secured and the digital chain of evidence is protected.
read more